ABSTRACT OF REPORT. Anshul Jain

Size: px
Start display at page:

Download "ABSTRACT OF REPORT. Anshul Jain"

Transcription

1 ABSTRACT OF REPORT Anshul Jain The Graduate School University of Kentucky 2003

2 Abstract IEEE 802:11-based wireless local area networks have been growing immensely in the last few years. Until then, LANs were limited to the physical, hard-wired infrastructure of the building. The major motivation and benefit from wireless LANs is increased mobility. When wireless station moves out of the range of one access point, it has to connect to another access point in order to remain connected. The process of association from one access point to another access point is called handoff. In this report, we present the details of the handoff process along with its various components and total time for handoff. In our study we found significant variations in handoff latency depending upon what channels the access points are on and whether the access points have the same SSID or not.

3 Handoff Delay for b Wireless LANs PROJECT REPORT A report submitted in partial fulfillment of the requirements for the degree of Master of Sciences at the University of Kentucky By Anshul Jain Advised By Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University of Kentucky 2003

4 Table of Contents 1 Introduction The IEEE 802:11 WirelessLANarchitecture :11 ManagementFrameFormat Handoff Procedure Steps during Handoff Experimental Setup HardwareSpecification SoftwareSpecification KismetWirelessSniffer Configuration Problems 15 5 Details of Experiments Handoff analysis when APs Having Different SSIDs are on Different Channels DetailedProcedure ResultsandAnalysis Handoff analysis when APs Having Different SSIDs are on the Same Channel DetailedProcedure ResultsandAnalysis Handoff Analysis when APs Having the same SSID are on Different Channels DetailedProcedure ResultsandAnalysis Handoff Analysis when APs Having the same SSID are on the Same Channel DetailedProcedure ResultsandAnalysis Effect of Beacon Interval on Handoff Latency DetailedProcedure ResultsandAnalysis Signal strength at the Point of Handoff DetailedProcedure ResultsandAnalysis Summary of Experiments 30 7 Conclusion 31 1

5 2 Bibliography 32

6 Chapter 1 Introduction The major motivation and benefit from wireless LANs is increased mobility. Untethered from conventional network connections, network users can move about almost without restriction and access LANs from nearly anywhere. 1.1 The IEEE 802:11 Wireless LAN architecture The architecture is comprised of several components and services that interact to provide station mobility transparent to the higher layers of the network stack [9]. Wireless LAN Station: The station (STA) is the most basic component of the wireless network. A station is any device that contains the functionality of the protocol, that being medium access control (MAC), physical layer (PHY), and a connection to the wireless media. Typically, the functions are implemented in the hardware and software of a network interface card (NIC). A station could be a laptop PC, handheld device, or an Access Point. Stations may be mobile, portable, or stationary and all stations support the station services of authentication, de-authentication, privacy, and data delivery. Basic Service Set (BSS): 802:11 defines the Basic Service Set (BSS) as the basic building block of an wireless LAN. The BSS consists of a group of any number of stations. Service Set Identifier (SSID): A service set identifier (SSID) is a unique label that distinguishes one WLAN from another. So all APs and all STAs attempting to connect to a specific WLAN must 3

7 4 use the same SSID. Wireless STAs use the SSID to establish and maintain connectivity with APs. An SSID is also referred to as a network name because essentially it is a name that identifies a wireless network. An SSID contains up to 32 alphanumeric characters, which are case sensitive. In IEEE s proposed standard for wireless LANs (IEEE 802:11), there are two different ways to configure a network: ad-hoc and infrastructure. In the ad-hoc network, computers are brought together to form a network on the fly. There is no structure to the network; there are no fixed points; and usually every node is able to communicate with every other node. The infrastructure architecture uses fixed network access points with which mobile nodes can communicate. These network access points are sometimes connected to backbone called distributed system, typically Ethernet, to expand the LAN s capability by bridging wireless nodes to other wired nodes. Distribution System (DS): The Distribution System is the means by which an access point communicates with another access point to exchange frames for stations in their respective BSSs, forward frames to mobile stations as they move from one BSS to another, and exchange frames with a wired network. Extended Service Set (ESS): An extended service set is a set of infrastructure BSSs, where the access points communicate amongst themselves to forward traffic from one BSS to another to facilitate movement of stations between BSSs. 802:11b follows a three non-overlapping channel based model that involves overlap and interference as per the table below. Channel Lower Freq ( MHz) Mid Freq ( MHz) Upper Freq ( MHz) Channel 1 ends at 2423 MHz and channel 4 starts at 2416 MHz, that is a significant overlap. The entire 22 MHz follows a parabola pattern with power on vertical axis and frequency on horizontal as shown in Fig. 1.1 below. In order to achieve mobility, STA should be able to move from one BSS to other BSS without loosing connnectivity. This process is called a handoff. Handoff and other distributed services like synchronization, scanning, association and disassociation are done by exchanging 802:11 manage-

8 5 Figure 1.1: Channel Allocation scheme for b [5] ment frames between particpating STAs and APs. Before we study the handoff procedure in detail in the next chapter, we describe the 802:11 management frames :11 Management Frame Format 802:11 management frames enable stations to establish and maintain communications. The following are common 802:11 management frame subtypes, with the description taken from [6]: Authentication frame: 802:11 authentication is a process whereby the access point either accepts or rejects the identity of a STA. The STA begins the process by sending an authentication frame containing its identity to the access point. With open system authentication (the default), the STA sends only one authentication frame, and the access point responds with an authentication frame as a response indicating acceptance (or rejection). See Fig Deauthentication frame: A station sends a deauthentication frame to another station if it wishes to terminate secure communications. Association request frame: association enables the access point to allocate resources for and synchronize with a STA. A STA begins the association process by sending an association

9 6 Figure 1.2: Snapshot of 802:11 Authentication Frame as seen in Ethereal request to an access point. This frame carries information about the STA (e.g., supported data rates) and the SSID of the network it wishes to associate with. After receiving the association request, the access point considers associating with the STA, and (if accepted) reserves memory space and establishes an association ID for the STA. Association response frame: An access point sends an association response frame containing an acceptance or rejection notice to the STA requesting association. If the access point accepts the STA, the frame includes information regarding the association, such as association ID and supported data rates. If the outcome of the association is positive, the STA can utilize the access point to communicate with other STAs on the network and systems on the distribution (i.e., Ethernet) side of the access point. Reassociation request frame: If a STA roams away from the currently associated access point and finds another access point having a stronger beacon signal, the STA will send a reassociation frame to the new access point. The new access point then coordinates the forwarding of data frames that may still be in the buffer of the previous access point waiting for transmission to the STA.

10 7 Reassociation response frame: An access point sends a reassociation response frame containing an acceptance or rejection notice to the STA requesting reassociation. Similar to the association process, the frame includes information regarding the association, such as association ID and supported data rates. Disassociation frame: A station sends a disassociation frame to another station if it wishes to terminate the association. For example, a STA that is shut down gracefully can send a disassociation frame to alert the access point that the STA is powering off. The access point can then relinquish memory allocations and remove the STA from the association table. Beacon frame: The access point periodically sends a beacon frame to announce its presence and relay information, such as timestamp, SSID, and other parameters regarding the access point to STAs that are within range. STAs continually scan all radio channels and listen to beacons as the basis for choosing which access point is best to associate with. Probe request frame: A station sends a probe request frame when it needs to obtain information from another station. For example, a STA would send a probe request to determine which access points are within range. See Fig Probe response frame: A station will respond with a probe response frame, containing capability information, supported data rates, etc., after it receives a probe request frame.

11 8 Figure 1.3: Snapshot of 802:11 Probe Request Frame as seen in Ethereal

12 Chapter 2 Handoff Procedure Handoff is a procedure executed when a mobile node moves from coverage area of one AP to that of another AP. The handoff process involves a sequence of messages being exchanged between the mobile node and the participating APs. This sequence of messages can be divided into three phases: probe, authentication and reassociation, which are described in detail later. The transfer from old AP to the new AP results in some state information being transfered from the former to the latter. The state information that is transferred consists of authentication, authorization and accounting information. This can be achieved by an Inter Access Point Protocol (IAPP) that is currently under draft in IEEE 802:11f, or by a protocol specific to the vendors. We used Cisco Aironet 1200 series APs that follow the Cisco Discovery Protocol (CDP). 2.1 Steps during Handoff The handoff process can be divided into two logical steps: discovery and reauthentication [1]. Discovery: The discovery process involves the handoff initiation phase and the scanning phase. When the STA is moving away from the AP it is currently associated with, the signal strength and the signal-to-noise ratio of the signal from the AP might decrease. This may cause STA to initiate a handoff. Now, the STA needs to find other APs that it can connect to. This is done by MAC layer scanning function. Scanning can be accomplished using either in passive or active mode. In passive scan mode, the STA listens to the wireless medium for beacon frames. Beacon frames provide a combination of timing and advertising information to the STAs. Using the information 9

13 10 obtained from beacon frames the STA can elect to join or decline the AP. During this scanning mode the STA listens to each channel of the physical layer in trying to locate an AP. Active scanning involves transmission of probe request frames by the STA in the wireless medium and processing the received probe responses from the APs. The basic procedure of the active scan mode includes the following steps as explained in [2]: 1. Using the normal channel access procedure, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), gain control of wireless medium. 2. Transmit a probe request frame which contains the broadcast address as destination. 3. Start a probe timer. 4. Listen for probe response. 5. If no response received by minchanneltime, scan next channel. 6. If one or more responses are received by minchanneltime, stop accepting probe responses at maxchanneltime and process all received responses. 7. Move to next channel and repeat above steps. After all channels have been scanned, all information received from probe responses is processed and passed to the management entity for selecting which AP to join. Reauthentication: The reauthentication process involves an authentication and a re-association to the new AP. This phase involves transfer of STA s credentials from old AP to the new AP. Authentication is a process by which the AP either accepts or rejects the identity of the STA. The STA begins the process by sending the authentication frame telling its identity to the AP. With the open system authentication that we are using in our experiments, the STA sends one authentication frame and the AP responds with an authentication frame as a response indicating acceptance or rejection. After authentication is successful, the STA sends the reassociation frame to the new AP. The new AP then sends a reassociation frame back to the STA containing an acceptance or rejection notice. Fig. 2.1 taken from [1] shows the sequence of messages expected during the handoff. As seen in the above figure the sequence of messages can be divided into three types:

14 11 Figure 2.1: Handoff procedure for b

15 12 1. Probe Messages: Once the STA decides to look for other APs, the probe phase starts. The STA starts sending out probe requests and process received probe responses based on active scanning algorithm explained above. The time spent during this probing process is called as probe delay. The probe messages form the discovery phase of the handoff. 2. Authentication Messages: OncetheSTAdecidestojoinanAP, authentication messages are exchanged between the STA and the selected AP. The time spent during this process is called authentication delay. The authentication messages form the reauthentication phase of the handoff. 3. Reassociation Messages: After successful authentication, the STA sends a reassociation request and expects a reassociation response back from the AP. The latency incurred during reassociation messages is called reassociation delay. Reassociation messages form the reauthentication phase of the handoff. After reassociation the new access point coordinates the forwarding of data frames that may still be in the buffer of the previous access point waiting for transmission to the STA.

16 Chapter 3 Experimental Setup 3.1 Hardware Specification The experiment consists of three hardware components: a wireless network, awireless client (STA) and two wireless sniffer systems. Wireless Network: The experiments were performed in the Laboratory of Advanced Networking at University of Kentucky. A university s campus wireless network named ukyedu already exists in the building. Another wireless network was deployed as a part of this experiment setup, named Anshul. The ukyedu network consists of six APs, one on channel 1 and five on channel 6. The Anshul network consists of two APs: one on channel 1 and the other on channel 11. ThetwoAPs of network Anshul are hosted on channel 1, 11, respectively, to avoid interference as channels 1 and 11 are non-overlapping. However, depending upon the requirements for the experiments we have changed the channel allocation and network names. The two APs on network Anshul are Cisco Aironet 1200 series access points. Wireless Client: The wireless client is a Pentium III 300 MHz, 256 MBRAMGatewaylaptop. The wireless card used is Cisco Aironet 350. Wireless Sniffer Systems: The first sniffer system is a Pentium IV 1:67 GH z, 256 MB RAM Sony laptop with Linksys WPC11 v3:0 wireless PCMCIA card. The second sniffer system is a Pentium III 300 MHz, 128 MB RAM IBM laptop with Linksys WPC11 v3:0 wireless PCMCIA card. 13

17 Software Specification Operating System 2:4: : The operating system used in experiments is Red Hat 8:0 with kernel version Drivers: 1. Driver used for Cisco 350 card is airo-linux driver downloaded from 2. Driver used for Linksys WPC11 v3:0 card is linux-wlan-ng pre10 driver downloaded from Software Tools: The other software tools used in the project are as follows: 1. We used Kismet 802:11 wireless network sniffer to sniff 802:11b packets on the wireless network. We used the version 2:8:1 of the software available at [13]. 2. We used the Ethereal network protocol analyzer to analyze sniffed 802:11b packets. We used version 0:9:6 1, packaged along with Red Hat 8:0. 3. We used Cisco Aironet Client Utility to configure the Cisco 350 cards. We used version 2:0 downloaded from Cisco s website. 3.3 Kismet Wireless Sniffer Kismet is an 802:11 wireless network sniffer. It separates and identifies different wireless networks in the area. It sniffs 802:11b packets on the wireless networks and allows Ethereal/tcpdump compatible file logging. Kismet s primary user interface is divided into three primary panels [13]: 1. Network display view: The network display panel shows all the networks which have been discovered. This list can be sorted and manipulated. 2. Information view: The information panel shows the total number of packets, current packet rate, amount of time the capture has been running, etc. 3. Status view: The status panel scrolls information and status events. Alerts appear in this panel, as well as in the alert popup.

18 Chapter 4 Configuration Problems 1. The Cisco drivers downloaded from Cisco s website do not support promiscuous mode, as confirmed by calling Cisco s technical support. As a result, one can just sniff wireless packets that are destined to the sniffer station and not every packet on the wireless medium. The Aironet drivers downloaded from sourceforge work well with Cisco 350 cards and support promiscuous mode. 2. Using Kismet, one can t restrict Cisco 350 cards to sniff on one particular channel. Cisco cards have tendency to hop between channels. Therefore, Cisco cards tend to miss many frames while hopping between channels. Cisco cards have a miss rate of around 30%. The only alternative I found was to use another vendor s wireless card. 3. With Cisco cards, no current drivers on linux reports signal strength correctly. The alternative is to use prism2-based cards that report the signal strength per frame received correctly. 4. In order to sniff IEEE 802:11 frames, the Kismet software puts the laptop in monitor mode which precludes the ability of the wireless card to send any data to the network. In order to send packets to the network, I had to use another network wireless interface. 5. The signal strength value reported by Kismet with a prism2 based Linksys card is a Received Signal Strength Indicator (RSSI) value. Each vendor has their own formula to convert this RSSI value to Decibel Milliwatts (dbm). I could not find this conversion formula for Linksys even after I called the Linksys technical support. 15

19 Chapter 5 Details of Experiments Experiments done are divided into the following categories: 1. Handoff analysis when APs having different SSIDs are on different channels (Section 5.1). 2. Handoff analysis when APs having different SSIDs are on the same channel (Section 5.2). 3. Handoff analysis when APs having the same SSID are on different channels (Section 5.3). 4. Handoff analysis when APs having the same SSID are on the same channel (Section 5.4). 5. Signal strength at the point of handoff (Section 5.5). 6. Effect of Beacon Interval on handoff Latency (Section 5.6). In all the experiments to follow, handoff is performed such that the STA leaves association with the AP on channel 11 and associates with an AP on channel Handoff analysis when APs Having Different SSIDs are on Different Channels Detailed Procedure The two APs named Anshul-1 and Anshul-2 form two overlapping cells. The power of each AP is adjusted so that the coverage areas for the APs overlap at some point and they are not coincident. AP Anshul-1 is running on channel 11 and Anshul-2 on channel 1. To force a handoff, the wireless client (STA) that is initially associated with Anshul-1 ismovedawaytowardsanshul-2. Thisis 16

20 17 considered as one run of the experiment. At some point during this run, the STA disassociates from Anshul-1 and associates with Anshul-2. During this handoff, a series of messages get exchanged between STA and APs. These messages are sniffed by wireless sniffer systems running the Kismet software [13]. One sniffer system is sniffing on the channel 1 and the other is sniffing on channel 11. To overcome the inaccuracy caused by inconsistent system clocks of the two sniffer laptops, we used the Network Time Protocol (NTP). The time server used is time.uky.edu, the local time server at University of Kentucky. In order to synchronize the clock with the time server, the sniffer laptops need to send NTP specific packets. Sniffer laptops being in monitor mode is unable to send any packets, and hence we have to use another ethernet interface on each of the two laptops to be able to synchronize using NTP with an estimated accuracy of 5 10 ms. As explained in the handoff procedure in Section 2.1, a fixed set of messages are sent by both the STA and APs. It is these messages we intend to capture and study using the experiments setup described above. We collected all the IEEE 802:11 management frames and then filtered out the rest to get Probe Request, Probe Response, Authentication, Reassociation Request and Reassociation Response. Total handoff delay is then calculated by counting time difference between the first probe request (on channel 1)andthereassociation response (also on channel 1) Results and Analysis The Fig. 5.1 shows the handoff latency when there are two APs with different SSID, Anshul-2 on channel 1 and Anshul-1 on channel 11. The graph depicts the results of 15 repetitions of the experiment with the experiment number on x-axis and handoff latency measured in milliseconds on y-axis. As can be seen from the graph, probe delay is the major contributing factor towards the total handoff latency. It is more than 99% of the overall handoff latency. Authentication delay and the reassociation delay account for a total of less than 1% of a total handoff latency. Average handoff latency across all the repetitions of the experiment is approximately 531:6 ms. Average probe delay, authentication delay and reassociation delay is approximately 528 ms, 1:3 ms and 2:3 ms, respectively. The 95% confidence interval for handoff latency is from 516:1 ms to

21 18 Figure 5.1: Handoff time when APs Having Different SSIDs are on Different Channels 547:106 ms calculated from [15]. This means if the same experiment is repeated 100 times, five times the handoff latency would fall outside the confidence interval. Since probe delay is the most significant part of the handoff process, we will explain that in detail. By sniffing at two different channels simultaneously (synchronized with Network Time Protocol) in different combination a couple of times, we came to know that Cisco 350 card starts probe request from channel 1 no matter which channel the currently associated AP is on. Since we have configured the Cisco card to connect to either of Anshul-1 or Anshul-2, the card sends two probe requests, one for each AP on each channel. That makes a total of 22 probe requests, which we confirmed by looking at their sequence numbers. The scanning process is expected to work according to the algorithm mentioned in Section 2.1. As can be seen in the Fig. 5.2, the probe process starts by broadcasting a probe request with SSID Anshul-2 on channel 1. The wireless card then starts the probe timer. The AP Anshul-2 sends a probe response back to the STA. The STA waits for the 37 ms since the transmission of first probe request and then sends another probe request with SSID Anshul-1 on the same channel to search AP Anshul-1. The card does not get a response from the

22 19 Figure 5.2: Probing Process Anshul-1 within 17 ms and therefore goes to scan the channel 2. On channel 2, this process is repeated except that none of the two APs should send a response back to the STA. The values 17 ms and 37 ms discovered during experiments are minchanneltime and maxchanneltime, respectively, for the Cisco 350 card. The total expected probe time that is the time between first probe request on channel 1 and the reassociation response on channel 1 should be: Channel 1: 37 ms delay for probe request to AP Anshul-2 and 17 ms for probe request to Anshul-1 for a total of 54 ms. Channel 2 10: 17 ms delay for probe request to AP Anshul-2 and 17 ms for probe request to Anshul-1 for a total of 306 ms for nine channels.

23 20 Channel 11: 17 ms delay for probe request to AP Anshul-2 and 37 ms for probe request to Anshul-1 for a total of 54 ms. This adds to a total of 414 ms expected probe delay. This is quite a bit less than the observed average probe delay of 528 ms. Looking in detail at the probe response messages, we observed that AP Anshul-2 on channel 1 is sending a probe response messages in reply to the probe requests by STA on channels 2, 3 and 4 and similarly AP Anshul-1 on channel 11 sends probe response messages in reply to the probe request by STA on channels 8, 9 and 10, when they should not. This is attributed to the channel allocation scheme for 802:11b. As explained in Chapter 1, channel 1 and channel 4 overlap significantly and so do channel 8 and channel 11. Therefore, APs Anshul-1 and Anshul-2 overhear probe request messages on overlapping channels. Since the probe request messages do not contain a channel number, APs have no way to distinguish these overheard probe requests from those on the channels they are working on. And therefore, the APs respond by sending probe response messages back to the STA for these overlapping channels. The total expected probe time should be: Channel 1: 37 ms delay for probe request to AP Anshul-2 and 17 ms for probe request to Anshul-1 for a total of 54 ms. Channel 2 4: 37 ms delay for probe request to AP Anshul-2 and 17 ms for probe request to Anshul-1 for a total of 162 ms for three channels. Channel 5 7: 17 ms delay for probe request to AP Anshul-2 and 17 ms for probe request to Anshul-1 for a total of 102 ms for three channels. Channel 8 10: 17 ms delay for probe request to AP Anshul-2 and 37 ms for probe request to Anshul-1 for a total of 162 ms for three channels. Channel 11: 17 ms delay for probe request to AP Anshul-2 and 37 ms for probe request to Anshul-1 for a total of 54 ms. This adds to a total of 534 ms expected probe latency which is approximately equal to the observed average probe latency of 528 ms. There is a variation in handoff latency from one repetition of experiment to other. This can be accounted for lost probe requests due to weak signal strength as the STA moves away from the

24 21 center frequency explained in Fig So, the APs may not hear the probe request messages on the overlapping channels with frequency some distance away from the center frequency of the channel they are working on. Since the STA does not get the probe response back because the AP missed the probe request, STA switches to next channel after waiting for minchanneltime. And, so there isasavingofmaxchanneltime - minchanneltime on the channel. 5.2 Handoff analysis when APs Having Different SSIDs are on the Same Channel Detailed Procedure Both the APs Anshul-1 and Anshul-2 are on the same channel 11. To force a handoff the wireless client (STA) that is initially associated with Anshul-1 is moved away towards Anshul-2. This is considered as one run of the experiment. One sniffer system is sniffing on channel 1 and the other is sniffing on channel 11. To overcome the inaccuracy caused by inconsistent system clocks of the two sniffer laptops, we used the Network Time Protocol (NTP). The time server used is time.uky.edu, the local time server at University of Kentucky. The total handoff delay is calculated by counting the time difference between the first probe request (on channel 1)andthereassociation response (on channel 11) Results and Analysis The Fig. 5.3 shows the handoff latency when there are two AP s with different SSID, both on channel 11. The graph depicts the results of 15 repetitions of experiment with experiment number on x-axis and handoff latency measured in milliseconds on y-axis. As can be seen from the graph, probe delay is the major contributing factor towards the total handoff latency. It is more than 99% of overall handoff latency. Authentication delay and reassociation delay account for a total of less than 1% of total handoff latency. Average handoff latency across all the repetetions of the experiment is approximately 532 ms. Average probe delay, authentication delay and reassociation delay is approximately 528:4 ms, 1:3 ms and 2:3 ms, respectively. The 95% confidence interval for handoff latency is from 510:306 ms to

25 22 Figure 5.3: Handoff time when APs Having Different SSIDs are on Same Channel 553:694 ms calculated from [15]. This means if the same experiment is repeated 100 times, five times the handoff latency would fall outside the confidence interval. Since both the APs Anshul-1 and Anshul-2 are on channel 11, therefore both the APs will respond back with a probe response for the probe request with respective SSIDs Anshul-1 and Anshul-2. Also, as explained in the Section above both the APs will overhear the overlapping channels and will respond back. Total expected probe time should be: Channel 1 7: 17 ms delay for probe request to AP Anshul-2 and 17 ms for probe request to Anshul-1 for a total of 238 ms for seven channels. Channel 8 10: 37 ms delay for probe request to AP Anshul-2 and 37 ms for probe request to Anshul-1 for a total of 222 ms for three channels. Channel 11: 37 ms delay for probe request to AP Anshul-2 and 37 ms for probe request to Anshul-1 for a total of 74 ms.

26 23 This adds to a total of 534 ms expected probe latency which is approximately equal to the observed average probe latency of 528:4 ms. The variation in handoff latency from one run of experiment to other can be accounted for the same reason as stated in Section above. 5.3 Handoff Analysis when APs Having the same SSID are on Different Channels Detailed Procedure For this experiment we changed the SSID of both the APs to Anshul. One of the two AP is running on channel 11 and other on the channel 1. One sniffer system is sniffing on channel 1 and the other is sniffing on channel 11. To overcome the inaccuracy caused by inconsistent system clocks of the two sniffer laptops, we used the Network Time Protocol (NTP). The time server used is time.uky.edu, the local time server at University of Kentucky. The total handoff delay is calculated by counting the time difference between the first probe request (on channel 1)andthereassociation response (also on channel 1) Results and Analysis The Fig. 5.4 shows the handoff latency when there are two AP s with same SSID, one on channel 1 and other on channel 11. The graph depicts the results of 15 repetitions of the experiment with the experiment number on x-axis and handoff latency measured in milliseconds on y-axis. As can be seen from the graph, again probe delay again is the major contributing factor towards the total handoff latency. It is more than 99% of overall handoff latency. Authentication delay and reassociation delay account for a total of less than 1% of total handoff latency. Average handoff latency across all the repetitions of the experiment is approximately 329:4 ms. Average probe delay, authentication delay and reassociation delay is approximately 325:8 ms, 1:3 ms and 2:3 ms, respectively. The 95% confidence interval is from 318:303 ms to 340:497 ms calculated from [15]. This means if the same experiment is repeated 100 times, five times the handoff latency would fall outside the confidence interval.

27 24 Figure 5.4: Handoff time when APs Having the same SSID are on Different Channels. Since both the APs have same SSID, Cisco card will send only one probe request on each channel unlike two in above experiments. Total expected probe time should be: Channel 1: 37 ms delay for probe request to AP Anshul. Channel 2 4: 37 ms delay for probe request to AP Anshul for a total of 111 ms for three channels. Channel 5 7: 17 ms delay for probe request to AP Anshul for a total of 51 ms for three channels. Channel 8 10: 37 ms delay for probe request to AP Anshul for a total of 111 ms for three channels. Channel 11: 37 ms delay for probe request to AP Anshul. This adds to a total of 347 ms expected probe latency which is approximately equal to the observed average handoff latency of 325:8 ms. The variation in handoff latency from one run of experiment to other can be accounted for the same reason as stated in Section above.

28 25 Figure 5.5: Handoff time when APs Having the same SSID are on the Same Channel. 5.4 Handoff Analysis when APs Having the same SSID are on the Same Channel Detailed Procedure For this experiment we changed the SSID of both the APs to Anshul. Both the APs are running on channel 11. One sniffer system is sniffing on channel 1 and the other is sniffing on channel 11. To overcome the inaccuracy caused by inconsistent system clocks of the two sniffer laptops, we used the Network Time Protocol (NTP). The time server used is time.uky.edu, the local time server at University of Kentucky. The total handoff delay is calculated by counting the time difference between the first probe request (on channel 1) andthereassociation response (on channel 11) Results and Analysis The Fig. 5.5 shows the handoff latency when there are two AP s with same SSID, both on channel 11. The graph depicts the results of 15 repetitions of the experiment with the experiment number on x-axis and handoff latency measured in milliseconds on y-axis.

29 26 As can be seen from the graph, once again probe delay is the major contributing factor towards the total handoff latency. It is more than 99% of overall handoff latency. Authentication delay and reassociation delay account for a total of less than 1% of total handoff latency. Average handoff latency across all the repetitions of the experiment is approximately 269:7 ms. Average probe delay, authentication delay and reassociation delay is approximately 266:1 ms, 1:3 ms and 2:3 ms, respectively. The 95% confidence interval for handoff latency is from 258:564 ms to 280:836 ms calculated from [15]. This means if the same experiment is repeated 100 times, five times the handoff latency would fall outside the confidence interval. Since both the APs have same SSID, Cisco card will send only one probe request on each channel. Also, for each probe request on channel 11, both the APs will respond for having the same SSID. Total expected probe time should be: Channel 1 7: 17 ms delay for probe request to AP Anshul for a total of 119 ms for seven channels. Channel 8 10: 37 ms delay for probe request to AP Anshul for a total of 111 ms for three channels. Channel 11: 37 ms delay for probe request to AP Anshul. This adds a total of 267 ms expected probe latency which is approximately equal to the observed average probe latency of 266:1 ms. 5.5 Effect of Beacon Interval on Handoff Latency Detailed Procedure The aim of the experiment is to check if there is any effect on handoff latency if we decrease the beacon frame interval. For this experiment the beacon frame interval is reduced to 50 ms instead of the default value of 100 ms. The rest of the experimental setup is identical to the experiment in which APs having the same SSID are on different channels Results and Analysis The Fig. 5.6 shows the handoff latency with the reduced beacon frame interval, when there are two AP s with same SSID, one on channel 1 and other on channel 11. The graph depicts the results

30 27 of five repetitions of the experiment with the experiment number on x-axis and handoff latency measured in milliseconds on y-axis. Average handoff latency across all the repetitions of the experiment is approximately 306:2 ms. Average probe delay, authentication delay and reassociation delay is approximately 302:6 ms, 1:3 ms and 2:3 ms, respectively. This average handoff latency is approximately equal to the handoff latency when beacon frame interval was 100 ms with rest of the experiment setup being the same. This experiment shows that there is no effect of beacon interval on the handoff latency. While reducing the beacon interval to 50 ms from 100 ms, allow the STA to check the signal strength value faster and hence can make a decision to start a handoff process earlier. However, once the handoff is initiated, it will take the same time. Figure 5.6: Effect of Beacon Interval on Handoff Latency

31 Signal strength at the Point of Handoff Detailed Procedure The signal strength value reported by Kismet with a prism2-based Linksys card is a Received Signal Strength Indicator (RSSI) value. Each vendor has their own formula to convert this RSSI value to Decibel Milliwatts (dbm). I could not find this conversion formula for Linksys. However, I got such a table for Cisco cards on Therefore, I used Cisco card instead of Linksys on sniffer system. Also, I did not trust the signal strength value reported by Kismet. So, I used Wildpacket s Airopeek software that runs on Windows XP. For this experiment, SSID of the APs and the channel they are working on doesn t matter. We set both the APs to have the same SSID (Anshul). One of the APs is running on the channel 1 and the other one is running on channel 11. One of the sniffer systems is sniffing on channel 1 and other on channel 11. The sniffer system sniffing on channel 11 is running Wildpacket s Airopeek software on windows XP. The other sniffer system is running kismet software on linux Red hat 8:0 as in the other experiments. The sniffer system running Airopeek is moved along with the wireless STA. The assumption is that the moving sniffer system would see approximately the same signal strength value as seen by wireless STA performing handoff. To force the handoff the wireless STA that is initially associated with AP on channel 11 is moved away towards AP on channel 1. Signal strength is measured by looking at the signal strength value reported by Airopeek for the beacon frame just prior to the first probe request by the STA (on channel 1) Results and Analysis The Fig. 5.7 shows the signal strength at the point of handoff, when there are two AP s with same SSID, one on channel 1 and other on channel 11. The graph depicts the results of 10 repetitions of the experiment with the experiment number on x-axis and signal strength measured in decibel milliwatts on y-axis. As can be seen in the graph, the signal strength value ranges from 75 dbm to 84 dbm with an average of 79:5 dbm. The corresponding RSSI values are 36%, 28% and 32%, respectively. The 95% confidence interval is from 81:926 dbm to 77:074 dbm calculated from [15]. This means if the same experiment is repeated 100 times, five times the handoff latency would fall outside the confidence interval.

32 29 Figure 5.7: Signal strength at the point of handoff

33 Chapter 6 Summary of Experiments Experiment Expected Result Observed Result Handoff latency when APs with different SSIDs 534 ms 531:6 ms are on different channels Handoff latency when APs with different SSIDs 534 ms 532 ms are on same channels Handoff latency when APs with same SSIDs are 347 ms 329:4 ms on different channels Handoff latency when APs with same SSIDs are on same channels 267 ms 266:1 ms Effect of beacon interval on handoff time 347 ms 306:2 ms Signal strength at the point of handoff - 79:5 dbm 30

34 Chapter 7 Conclusion In the project we studied handoff process in detail. We find out that there are three logical steps involved in handoff: probe, authentication and reassociation. Probe delay accounts for more than 99% of overall handoff latency. We also find out that there are significant variations in handoff latancies when the two APs are on different channels and also when they have different SSID. We saw that the handoff latency is smallest when we have APs with same SSID and on the same channel. The probe process starts when the signal strength of the beacon frames received goes below a certain threshold (specific to each vendor). There is no way to change this threshold, but, changing the threshold will not effect the handoff latency. This is because reducing or increasing the threshold will just effect the start-time of handoff process and not the overall handoff latency. We also did experiments to check if the beacon frames interval has any effect on handoff latency. Reducing the beacon interval from the default value of 100 ms to 50 ms started the probe process 50 ms earlier. But, once started the handoff took approximately the same time. So, beacon interval did not have any effect on handoff latency. Another interesting result is that the handoff latencies we measured far exceed the guidelines for jitter in voice over IP applications where the overall latency is recommended not to exceed 50 ms [14]. 31

35 Bibliography [1] A. Mishra, M. Shin, W. Arbaugh. An Empirical Analysis of the IEEE MAC Layer Handoff Process. Technical report, University of Maryland, [2] IEEE Std b, 1999, Wireless LAN Medium Access Control (MAC) and Physical (PHY) specifications: High Speed Physical Layer Extension in the 2.4 GHz Band. IEEE, New York, NY, [3] W. Arbaugh, N. Shankar, J. Wan. Your Wireless Network has No Clothes. Technical report, Department of Computer Science, University of Maryland, College Park, [4] Jiang Wu. A Mobility Support Agent Architecture for Seamless IP Handover. Technical report, Royal Institute of Technology, Sweden, June [5] B. Hara, Al Petrick. The IEEE Handbook: A Designer s Companion. IEEE, [6] J. Geier. Understanding Frame Types. Jupitermedia Corporation, August URL : wi-fiplanet.com/tutorials/article.php/ [7] J. Tourrihes. Wireless LAN resources for Linux. Hewlett Packard, URL : hpl.hp.com/personal/jean Tourrihes/Linux/ [8] J Bardwell. Converting Signal Strength Percentage to dbm Values. November URL : wildpackets.com/elements/whitepapers/converting Signal Strength.pdf [9] P. Brenner. A Technical Tutorial on the IEEE Protocol. July, URL : sss mag.com/pdf/802 11tut.pdf [10] O. Meir, I. Bar. IEEE WLAN URL : wwwcomnet.technion.ac.il/ cn3s02/presentations/ieee WLAN.ppt 32

36 33 [11] R. Cole, J. Rosenbluth. Voive Over IP Performance Monitoring. ACM Computer Communication Review, vol. 31, no. 2, pp. 9 24, April [12] G. Combs. Ethereal Network Protocol Analyser. URL : ethereal.com [13] M. Kershaw. Kismet Wireless Network Sniffer. URL : kismetwireless.net [14] International Telecommunication Union. General Characterstics of International Telephone Connections and International Circuits. ITU-TG.114, [15] S. Waner and S. Costenoble. Confidence Intervals, Miscellaneous on-line topics for Finite Mathematics 2e. September, 2000.

Reducing MAC Layer Handoff Latency in IEEE Wireless LANs

Reducing MAC Layer Handoff Latency in IEEE Wireless LANs Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph

Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University,

More information

An Empirical Analysis of the IEEE MAC Layer Handoff Process

An Empirical Analysis of the IEEE MAC Layer Handoff Process An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process Arunesh Mishra Dept of Computer Science University of Maryland College Park, MD, USA arunesh@cs.umd.edu Minho Shin Dept of Computer Science

More information

CSCD 433/533 Advanced Networking

CSCD 433/533 Advanced Networking CSCD 433/533 Advanced Networking Lecture 6 Wireless LAN Components and Characteristics Winter 2017 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Introduction

More information

ECE 435 Network Engineering Lecture 8

ECE 435 Network Engineering Lecture 8 ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Hye-Soo Kim, Sang-Hee Park, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University, Anam-Dong

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Hye-Soo Kim, Sang-Hee Park, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University, Anam-Dong

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

IEEE Notes. 1 Local Area Networks. 2 Protocols. 3 Network Model

IEEE Notes. 1 Local Area Networks. 2 Protocols. 3 Network Model IEEE 802.11 Notes This document provides a primer on the layered Internet protocol stack and its correspondence to the IEEE 802.11 standard. The components and architecture of an 802.11 network along with

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

FastScan - A handoff scheme for Voice over IEEE WLANs

FastScan - A handoff scheme for Voice over IEEE WLANs Noname manuscript No. (will be inserted by the editor) FastScan - A handoff scheme for Voice over IEEE 802.11 WLANs Ilango Purushothaman Sumit Roy Received: date / Accepted: date Abstract IEEE 802.11 Wireless

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

ABHELSINKI UNIVERSITY OF TECHNOLOGY

ABHELSINKI UNIVERSITY OF TECHNOLOGY cm. Management Operations of the IEEE 802.11 Mei Yen Cheong meiyen.cheong@hut.fi S-72.333 Postgraduate Seminar on Radio Communications Helsinki University of Technology April 13, 2004 Management Operations

More information

Improving the latency of Hand-offs using Sentinel based Architecture

Improving the latency of Hand-offs using Sentinel based Architecture Improving the latency of 802.11 Hand-offs using Sentinel based Architecture Lenin Ravindranath, Fredrick Prashanth, Leo Prasath, Praveen Durairaj, Arul Siromoney Department of Computer Science and Engineering,

More information

Basic processes in IEEE networks

Basic processes in IEEE networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters IEEE 802.11 Terminology Station (STA) Architecture: Device that contains IEEE

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Lecture (08) Wireless Traffic Flow and AP Discovery

Lecture (08) Wireless Traffic Flow and AP Discovery Lecture (08) Wireless Traffic Flow and AP Discovery Dr. Ahmed ElShafee 1 Dr. Ahmed ElShafee, ACU Spring 2011, Wireless Network Agenda Wireless Frame Types Sending a Frames Wireless Frame Headers Frame

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Chapter 7. Basic Wireless Concepts and Configuration. Part I Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services CHAPTER 11 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access point/bridges for wireless domain services

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Improving the IEEE MAC Layer Handoff Latency to Support Multimedia Traffic

Improving the IEEE MAC Layer Handoff Latency to Support Multimedia Traffic Improving the IEEE 802.11 MAC Layer Handoff Latency to Support Multimedia Traffic Yogesh Ashok Powar and Varsha Apte Dept. of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Internetwork Expert s CCNP Bootcamp Wireless LANs http:// WLANs Overview WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Upper layer protocols like IP/TCP/UDP/etc. are

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS

HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS THE WI-FI COMMUNICATION PROCESS MECHANICS MECHANICS: HOW WI-FI COMMUNICATION WORKS WHAT WE LL BE COVERING Brief Discourse on Frame Types Discovery of Wi-Fi

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Engineering Swarm- Services CS

Engineering Swarm- Services CS Engineering Swarm- Services CS 294-97 Spring 2014 John Wawrzynek Adam Wolisz Technische Universitat Berlin UC Berkeley EECS Adjunct Lecture 01, Introduction 1 CS294-97, UC Berkeley Spring 14 Beacons Transmitted

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change 802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Wireless network overview Slide from 2 nd book 1 IT352 Network Security Najwa AlGhamdi IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

Managing Rogue Devices

Managing Rogue Devices Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Wi-Fi: The Importance of Mobility in Industrial Environments

Wi-Fi: The Importance of Mobility in Industrial Environments Wi-Fi: The Importance of Mobility in Industrial Environments Originally Published: November 2009 Updated: June/July 2010, October 2012 A White Paper from Laird Technologies Today s mobile workers need

More information

Chapter 3.1 Acknowledgment:

Chapter 3.1 Acknowledgment: Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

WLAN The Wireless Local Area Network Consortium

WLAN The Wireless Local Area Network Consortium WLAN The Wireless Local Area Network Consortium 802.11 Base AP MAC Layer Test Suite Version 3.5 Technical Document Last Updated: February 18, 2012 Wireless LAN Consortium 121 Technology Drive, Suite 2

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Configuring Client Roaming

Configuring Client Roaming Finding Feature Information, page 1 Restrictions for, page 1 Information About Client Roaming, page 2 How to Configure Layer 2 or Layer 3 Roaming, page 4 Monitoring Client Roaming Parameters, page 10 Monitoring

More information

WiFi. A Fast Beacon Scanning Method for WiFi Positioning System. Yusuke Konishi 1 and Toshiyasu Nakao 1 LAN PDA LAN STA STA. 2.1 IEEE 802.

WiFi. A Fast Beacon Scanning Method for WiFi Positioning System. Yusuke Konishi 1 and Toshiyasu Nakao 1 LAN PDA LAN STA STA. 2.1 IEEE 802. WiFi 1 1 LAN LAN LAN IEEE 82.11 LAN IEEE 82.11b/g DSSS A Fast Beacon Scanning Method for WiFi Positioning System Yusuke Konishi 1 and Toshiyasu Nakao 1 Recently, WLAN infrastructure and mobile terminals

More information

Per-WLAN Wireless Settings

Per-WLAN Wireless Settings DTIM Period, page 1 Off-Channel Scanning Deferral, page 3 Cisco Client Extensions, page 10 Client Profiling, page 12 Client Count per WLAN, page 15 DTIM Period Information About DTIM Period In the 802.11

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Configuring Client Roaming

Configuring Client Roaming Finding Feature Information, page 1 Restrictions for, page 1 Information About Client Roaming, page 2 How to Configure Layer 2 or Layer 3 Roaming, page 4 Monitoring Client Roaming Parameters, page 11 Monitoring

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter descibes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network

Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network Arunesh Mishra, Min-ho Shin, and William A. Arbaugh Computer Science Technical Report CS-TR-4477, and UMIACS Technical Report

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Family Structural Overview

Family Structural Overview Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE

Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE 802.11 Chien-Chao Tseng *, Chia-Liang Lin *, Yu-Jen Chang * and Li-Hsing Yen * Department of Computer Science, National Chiao Tung University,

More information

Whitepaper. MYSTERIES OF Wi-Fi ROAMING REVEALED. Understand Wi-Fi roaming problems so you can solve them

Whitepaper. MYSTERIES OF Wi-Fi ROAMING REVEALED. Understand Wi-Fi roaming problems so you can solve them Whitepaper MYSTERIES OF Wi-Fi ROAMING REVEALED Understand Wi-Fi roaming problems so you can solve them Table of Contents Basics of Roaming... 2 Roaming Defined... 2 Connection Metrics... 3 Preemptive vs.

More information

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of

More information

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7 ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless

More information

Enhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks*

Enhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks* Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks* Deepesh Man Shrestha Graduate School of Information and Communication Ajou University, Suwon, Republic of Korea deepesh@ajou.ac.kr

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed. Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in

More information

VLANs and Association Redirection. Jon Ellch

VLANs and Association Redirection. Jon Ellch 802.11 VLANs and Association Redirection Jon Ellch Contents 1 Foreword 2 2 Background 3 3 Introduction 4 3.1 The state of the art......................................... 4 4 PVLANs and virtual BSSIDs

More information

Configuring the Radio Network

Configuring the Radio Network CHAPTER 4 This chapter describes the procedures for configuring the bridge s radio network. Here s what you ll find in this chapter: Using the Configuration Radio Menu, page 4-2 Establishing an SSID (Ssid),

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

CSCI-1680 Wireless Chen Avin

CSCI-1680 Wireless Chen Avin CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks

More information